Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Featured Stories

Featured Stories
Featured Stories RSS Feed RSS

How to Adjust Security for Hazardous Locations

Many enterprises are looking beyond the U.S. shores to expand into emerging markets.
Claire Meyer
September 1, 2014

Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.


Read More

ASIS 2014: Technology to Equip Enterprises for Success

Noteworthy Security Products from ASIS 2014
Claire Meyer
September 1, 2014

Get a sneak peek at the security products to be showcased at ASIS 2014.


Read More

Using Badges to Realize Special-Needs Kids' Disney Dreams

The Kraddick Foundation didn’t seek out badging help from Diamond Business Services, Inc.
September 1, 2014

Kraddick spoke of his Foundation’s work with chronic and terminally ill children and funding an all-expense paid trip to Walt Disney World in Florida each year. The story tugged at the heartstrings of Pence, who has a healthy daughter that she adopted from Russia.


Read More

7 Factors for Choosing the Right Entryway Security

Looking to make a change in your entryway security?
Greg Schreiber.jpg
Greg Schreiber
September 1, 2014

Aesthetics are important initially, but they should not trump security, safety or throughput. The winning solution has to meet high aesthetic requirements without sacrificing the other key decision factors.


Read More

TV Station Upgrades with Visitor Management System

Over the past 15 years the visitor management market has evolved from a simple “hello my name is” label to roaming officers processing visitors with 4G-enabled tablets and evacuation systems
Karyn Hodgson
September 1, 2014

Employees are currently able to pre-register guests both from their desktop and from their home computer or laptop. KGW is collaborating with Veristream to work on an app that will also allow them to do it from their cellphones in the near future.


Read More

Megapixel Cameras Boost Investigative Potential, Efficiency

When it comes to surveillance, megapixel is the word.
diane-2016-200.jpg
Diane Ritchey
Claire Meyer
September 1, 2014

Several situations show the benefits that megapixel can offer a security enterprise executive, including the Nebraska Medical Center, located in Omaha, that has a number of patients who require 24/7 observation.


Read More

Enhancing the Security Experience with Social Applications

How social applications will transform the security experience
Steve Van Till
Steve Van Till
September 1, 2014

Social spaces will be able to identify and know their inhabitants, visitors, guests, caretakers, administrators, and any other people who interact with them. This knowledge is a fundamental building block because social relationships are built on the concept of stable personal identity over time.


Read More

Managing Security for a Growing Corporate Campus

The Cox Enterprises campus went from having one employee entrance to three, in addition to a visitor entrance.
Claire Meyer
September 1, 2014

While the police and fire department response times are good in Sandy Springs, Georgia, in medical emergencies, security officers are often the first on the scene. The G4S officers are trained in first aid and automated external defibrillator (AED) devices.


Read More

How Atlanta Increased Security by Sharing Surveillance

Atlanta’s Operation Shield Video Integration Center (VIC) started with a mere 17 city-funded cameras three years ago.
Claire Meyer
September 1, 2014

Through the VIC, private-sector enterprises can join the program for a small licensing fee, and tie their exterior surveillance cameras into the VIC network. Or, if they prefer, enterprises (especially small businesses or residential complexes) can lease a camera from the police department or another proprietary business.


Read More

How Enterprise Situational Awareness Builds Metrics

It’s a common phrase in the security field: “There is no silver bullet to prevent incidents.”
September 1, 2014

By combining video surveillance and big data gathered throughout the enterprise, he and his team can look for red flags, such as one particular bartender who has low revenue, a high number of voids and no-sales.


Read More
Previous 1 2 … 38 39 40 41 42 43 44 45 46 … 72 73 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing